Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Cryptocurrency: Platforms

Search All Applications in Cryptocurrency: Platforms


Application US20200265532


Published 2020-08-20

Digital Property Authentication And Management System

Systems and methods for digital property authentication and management are disclosed. A document representing a trade secret may be requested to be registered with a trade secret registry. A document obfuscation value corresponding to the document may be generated and may be registered with a blockchain. A record of the registration may be generated for the trade secret registry. The registry may be searchable and/or offer functionality such as valuation, insurance provision, and/or verification, among other benefits and functionalities.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A system comprising: one or more processors; and non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising: storing, in association with a trade secret registry, a first record indicating: a first document obfuscation value corresponding to a first document representing a trade secret; and a block value generated based at least in part on the first document obfuscation value, the block value representing a block in a blockchain of a distributed-ledger system; receiving an indication that the first document represents a first version of the first document; receiving, from an electronic device, input data requesting to register a second document in association with the trade secret registry; receiving, from the electronic device, a second document obfuscation value corresponding to the second document; determining, based at least in part on a comparison of the first document obfuscation value with the second document obfuscation value, that the second document corresponds to a second version of the first document; and generating a second record: indicating that an identifier of the second document has been registered in association with the trade secret registry; indicating that the second document is the second version of the first document; and including a selectable link that, when selected, causes display of the first record.

  • 9. A method, comprising: storing, in association with a trade secret registry, a record indicating: a first document obfuscation value corresponding to a document representing a trade secret; and a first block value generated based at least in part on the first document obfuscation value, the first block value representing a first block in a blockchain of a distributed-ledger system; receiving, from an electronic device, valuation data indicated to be relevant to a value of the trade secret; receiving, from the electronic device, a second document obfuscation value corresponding to the valuation data; receiving, from at least one of the electronic device or the distributed-ledger system, a second block value generated based at least in part on the second document obfuscation value, the second block value representing a second block in the blockchain; and wherein the record includes the second document obfuscation value and the second block value.

  • 13. A system comprising: one or more processors; and non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising: storing first access-control data indicating: a first identifier of a first person permitted to access a record associated with a trade secret registry, the record indicating a trade secret registered in association with the trade secret registry; and a functionality of the trade secret registry authorized for use by the first person; storing second access-control data indicating: a second identifier of a second person permitted to access the record; and that the second person is unauthorized to use the functionality; receiving first input data requesting access to the record, the first input data indicating that the second person is requesting access to the record; causing display, based at least in part on the first input data, of the record; receiving second input data requesting use of the functionality; and refraining from causing the functionality to be performed based at least in part on the second access-control data indicating the second person is unauthorized to use the functionality.